Skip to content

Clarify managed proxy IP stability is per-session, not across sessions#368

Merged
masnwilliams merged 3 commits into
mainfrom
hypeship/managed-auth-static-ip-docs
May 15, 2026
Merged

Clarify managed proxy IP stability is per-session, not across sessions#368
masnwilliams merged 3 commits into
mainfrom
hypeship/managed-auth-static-ip-docs

Conversation

@masnwilliams
Copy link
Copy Markdown
Contributor

@masnwilliams masnwilliams commented May 15, 2026

Summary

Our proxy docs currently state that ISP and datacenter proxies provide a "static exit IP that stays consistent across all connections." That's only true within a single session — the managed proxy service does not pin the same egress IP across separate sessions.

This matters for managed auth: when health checks and reauth attempts run on different egress IPs, sites with adaptive auth may flag the IP shift and trigger a step-up challenge (one-time code, device verification) that the agent can't solve.

This PR clarifies:

  • ISP and datacenter proxies are stable within a session but not guaranteed across sessions.
  • For a truly static IP across the initial login and every subsequent health check / reauth, use a custom (BYO) proxy pointed at infrastructure you control.

Updated:

  • proxies/overview.mdx
  • proxies/isp.mdx
  • proxies/datacenter.mdx
  • auth/configuration.mdx

Test plan

  • Mintlify preview renders without broken links
  • Internal links to /proxies/custom and /auth/overview resolve

Note

Low Risk
Documentation-only changes that adjust wording around proxy IP rotation/stability; low risk aside from potentially changing user expectations and guidance for managed auth setups.

Overview
Clarifies in proxy and managed-auth docs that ISP and datacenter proxies have a stable exit IP only within a single browser session, and are not guaranteed to keep the same egress IP across sessions.

Updates guidance to direct users who need a truly static cross-session egress (e.g. IP allowlists or managed-auth health checks/reauth) toward using a custom (BYO) proxy, and adds cross-links from the ISP/datacenter pages back to proxies/overview.

Reviewed by Cursor Bugbot for commit b4abc50. Bugbot is set up for automated code reviews on this repo. Configure here.

Managed ISP/datacenter proxies are stable within a session but do not
guarantee the same egress IP across sessions. For destinations that need
a single static IP across every session — IP allowlists, managed-auth
connections whose health checks and reauths must look like the same
client — point a custom (BYO) proxy at infrastructure you control.
@mintlify
Copy link
Copy Markdown
Contributor

mintlify Bot commented May 15, 2026

Preview deployment for your docs. Learn more about Mintlify Previews.

Project Status Preview Updated (UTC)
Kernel 🟢 Ready View Preview May 15, 2026, 7:34 PM

💡 Tip: Enable Workflows to automatically generate PRs for you.

@masnwilliams masnwilliams marked this pull request as ready for review May 15, 2026 19:39
cursor[bot]
cursor Bot approved these changes May 15, 2026
Comment thread proxies/datacenter.mdx Outdated
per-proxy pages now state only the per-session stability fact and link
to proxies/overview for the cross-session caveat, so the detailed
explanation lives in one place.
Copy link
Copy Markdown

@cursor cursor Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Stale comment

Risk assessment: Very Low.

The diff only updates MDX documentation copy in auth/configuration.mdx, proxies/datacenter.mdx, proxies/isp.mdx, and proxies/overview.mdx to clarify managed proxy IP stability across sessions. There are no code, config, navigation, API, infrastructure, or runtime behavior changes, and I did not find a CODEOWNERS file requiring an owner review.

The PR is already approved at the current head commit, so I’m not re-approving it.

Open in Web View Automation 

Sent by Cursor Automation: Assign PR reviewers

Comment thread proxies/overview.mdx
Copy link
Copy Markdown

@cursor cursor Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Risk assessment: Very Low.

I assessed the current diff only. It changes copy in auth/configuration.mdx, proxies/datacenter.mdx, proxies/isp.mdx, and proxies/overview.mdx to clarify proxy exit IP stability. There are no code, config, navigation, infrastructure, API, or runtime behavior changes, and I found no CODEOWNERS file requiring owner review.

The PR already has an approval recorded, so I’m not re-approving it. The synchronized update does not increase risk, so no approval dismissal is needed.

Open in Web View Automation 

Sent by Cursor Automation: Assign PR reviewers

Copy link
Copy Markdown

@cursor cursor Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 1 potential issue.

Fix All in Cursor

❌ Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.

Reviewed by Cursor Bugbot for commit b4abc50. Configure here.

Comment thread auth/configuration.mdx
- **[ISP](/proxies/isp)** and **[datacenter](/proxies/datacenter)** proxies provide a stable exit IP within a single session, but Kernel does not guarantee the same IP across sessions. Sites with adaptive auth that trigger a step-up challenge (one-time code, device verification) when the client IP changes may flag the IP shift between the initial login and a subsequent health check or reauth.
- **[Residential](/proxies/residential)** proxies rotate IPs per connection — use them when you need legitimacy from a real ISP pool but can tolerate IP changes.
- **[Custom (BYO)](/proxies/custom)** proxies route through whatever you point them at, so this is the right pick if you need a truly static IP under your own control (e.g. an allowlisted egress your security team owns).
- **[Custom (BYO)](/proxies/custom)** proxies route through whatever you point them at, so this is the right pick if you need a truly static IP that persists across the initial login and every subsequent health check and reauth (e.g. an allowlisted egress your security team owns).
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Deep IP-stability content duplicated across auth and proxy pages

Low Severity

The per-session-vs-cross-session IP stability explanation is now reproduced in depth in both auth/configuration.mdx and proxies/overview.mdx (and echoed in the ISP/datacenter pages). This same PR correctly applies the brief-summary-plus-link pattern in proxies/isp.mdx and proxies/datacenter.mdx, but auth/configuration.mdx instead expands the material inline (step-up challenges, health checks, reauth) without linking to the canonical proxy overview. The auth-specific implications are valuable, but the core factual content about session-scoped IP stability is duplicated rather than briefly summarized with a link-out.

Additional Locations (1)
Fix in Cursor Fix in Web

Triggered by learned rule: Single source of truth — no deep content duplication across pages

Reviewed by Cursor Bugbot for commit b4abc50. Configure here.

@masnwilliams masnwilliams merged commit 4d4e9a9 into main May 15, 2026
4 checks passed
@masnwilliams masnwilliams deleted the hypeship/managed-auth-static-ip-docs branch May 15, 2026 20:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant